製品・ソフトウェアに関する情報
Cisco Wireless LAN Controller および Aironet Access Point における認証に関する脆弱性
Title Cisco Wireless LAN Controller および Aironet Access Point における認証に関する脆弱性
Summary

Cisco Wireless LAN Controller (WLC) および Aironet Access Point には、認証に関する脆弱性が存在します。 ベンダは、本脆弱性を Bug ID CSCvc79502 および CSCvf71789 として公開しています。

Possible impacts 情報を改ざんされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date May 2, 2018, midnight
Registration Date June 29, 2018, 5:44 p.m.
Last Update June 29, 2018, 5:44 p.m.
CVSS3.0 : 警告
Score 4.7
Vector CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
CVSS2.0 : 注意
Score 3.3
Vector AV:A/AC:L/Au:N/C:N/I:P/A:N
Affected System
シスコシステムズ
Cisco Aironet アクセス ポイント ソフトウェア 
Cisco Wireless LAN Controller ソフトウェア 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2018年06月29日]
  掲載
June 29, 2018, 5:44 p.m.

NVD Vulnerability Information
CVE-2018-0247
Summary

A vulnerability in Web Authentication (WebAuth) clients for the Cisco Wireless LAN Controller (WLC) and Aironet Access Points running Cisco IOS Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic. The vulnerability is due to incorrect implementation of authentication for WebAuth clients in a specific configuration. An attacker could exploit this vulnerability by sending traffic to local network resources without having gone through authentication. A successful exploit could allow the attacker to bypass authentication and pass traffic. This affects Cisco Aironet Access Points running Cisco IOS Software and Cisco Wireless LAN Controller (WLC) releases prior to 8.5.110.0 for the following specific WLC configuration only: (1) The Access Point (AP) is configured in FlexConnect Mode with NAT. (2) The WLAN is configured for central switching, meaning the client is being assigned a unique IP address. (3) The AP is configured with a Split Tunnel access control list (ACL) for access to local network resources, meaning the AP is doing the NAT on the connection. (4) The client is using WebAuth. This vulnerability does not apply to .1x clients in the same configuration. Cisco Bug IDs: CSCvc79502, CSCvf71789.

Publication Date May 3, 2018, 7:29 a.m.
Registration Date March 1, 2021, 6:36 p.m.
Last Update Nov. 21, 2024, 12:37 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:cisco:wireless_lan_controller_software:8.3\(104.105\):*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:o:cisco:aironet_access_point_software:8.3\(104.105\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:aironet_access_point_software:8.5\(107.52\):*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List